Controlling the Mobility of Multiple Data Transport Ferries in a Delay-Tolerant Network

Size: px
Start display at page:

Download "Controlling the Mobility of Multiple Data Transport Ferries in a Delay-Tolerant Network"

Transcription

1 Controlling the Mobility of Multiple Data ransport Ferries in a Delay-olerant Network Wenrui Zhao, Mostafa Ammar and Ellen Zegura College of Computing, Georgia Institute of echnology, Atlanta, Georgia wrzhao, ammar, Abstract As technology rapidly progresses, more devices will combine both communication and mobility capabilities. With mobility in devices, we envision a new class of proactive networks that are able to adapt themselves, via physical movement, to meet the needs of applications. o fully realize these opportunities, effective control of device mobility and the interaction between devices is needed. In this paper, we consider the Message Ferrying (MF) scheme which exploits controlled mobility to transport data in delay-tolerant networks, where end-to-end paths may not exist between nodes. In the MF scheme, a set of special mobile nodes called message ferries are responsible for carrying data for nodes in the network. We study the use of multiple ferries in such networks, which may be necessary to address performance and robustness concerns. We focus on the design of ferry routes. With the possibilities of interaction between ferries, the route design problem is challenging. We present algorithms to calculate routes such that the traffic demand is met and the data delivery delay is minimized. We evaluate these algorithms under a variety of network conditions via simulations. Our goal is to guide the design of MF systems and understand the tradeoff between the incurred cost of multiple ferries and the improved performance. We show that the performance scales well with the number of ferries in terms of throughput, delay and resource requirements in both ferries and nodes. Index erms System design, Simulations I. INRODUCION As technology rapidly progresses, more devices will combine both communication and mobility capabilities. For example, mobile robots have been developed for a wide range of applications, such as military, disaster recovery, home and factories [], [4], [5], [9]. Researchers are also developing robotic prototypes, such as robotic insects that can fly or walk on water [], []. It is anticipated that devices with mobility and communication capabilities will become more popular in the future. In addition, device mobility can be achieved via the movement of other entities. For example, movement of people, ground or aerial vehicles may provide the required mobility for the carried devices. With mobility capability in communication devices, we envision a new class of proactive networks that are able to adapt themselves, via physical movement, to meet the needs of applications. his is in contrast to traditional networks where applications are required to adapt to network mobility conditions []. he physical adaptability of these networks has the potential to provide new or better services to users. o fully realize these benefits, however, effective control of his work was supported by the NSF Grant IR-6 and AFOSR MURI Grant F the network, or the mobility of devices and the interaction between devices, is needed. While controlled mobility is an active research area in the robotics community [], there has been little effort in exploiting this capability for communication purposes. Li and Rus [] consider proactive movement of nodes to deliver messages in a disconnected environment and present an algorithm to compute optimal node trajectories. In [], Goldenberg et al. study mobility as a control primitive in mobile networks and present a distributed mobility control scheme to adjust node positions such that energy consumption in communication is minimized. In the NIMS project [8], Kaiser et al. propose the use of infrastructure-supported mobility in sensor networks for autonomous operations and physical reconfiguration. hey describe the use of mobility to transport data and optimize wireless links. In prior work [9], [], we have proposed the Message Ferrying (MF) scheme for delay-tolerant networks where endto-end paths do not exist between some or all nodes [], [5]. o overcome network partitions, the MF scheme exploits controlled mobility to transport data. Specifically, a set of special mobile nodes called message ferries move around the deployment area and are responsible for carrying data between nodes. he MF scheme can be used in different delay-tolerant environments. For example, in a disaster scene where existing infrastructure is unusable, airplanes or vehicles can be used as ferries to transport data between users in separated areas. In sensor networks where power supplies are severely limited, mobile entities such as robots or manned vehicles can be deployed to approach and collect data from sensors in order to conserve sensor energy. In MF networks, data is transported via ferry mobility. herefore, the design of ferry movement, or ferry routes, will have significant impact on network performance. In our earlier work [9] we consider ferry route design in networks with a single ferry and develop algorithms to compute a ferry s route in order to achieve certain performance objectives. In this paper, we study the use of multiple ferries in networks with stationary nodes, focusing on the design of ferry routes. he use of multiple ferries may be necessary in many situations due to performance and robustness concerns. First, the capacity of a single ferry to carry and forward traffic In [], we study the MF scheme in mobile networks but do not consider the ferry route design problem.

2 is limited by its movement capability. o allow for scalability in traffic load or geographic coverage, multiple ferries are required. Second, a single ferry system is vulnerable to ferry failures, ferry compromise or malicious attacks. Multiple ferries would provide the required level of fault tolerance via redundancy. On the other hand, with the possibilities of interaction between ferries, the use of multiple ferries brings significant challenges to the route design problem as compared to the single ferry case. Since data from nodes can be carried by different ferries, there is a question of how ferries are allocated to serve nodes. In addition, ferries may interact with each other, either directly or indirectly via nodes, to provide better communication services. In this case, the design of ferry routes should account for routing and load balancing among ferries, which inevitably complicates the problem. here is also the question of tradeoff between the increased cost of the use of more ferries and the extent of performance improvement realized. We consider different strategies in the route design that reflect different assumptions about the network, e.g., whether the multiple ferries go over the same or different routes, and how ferries interact with each other. We develop algorithms to generate ferry routes that meet the traffic demand and minimize the average data delivery delay. Using simulations, we evaluate these algorithms under a variety of network conditions and study the data delivery performance of the MF schemes. Our goal is to guide the design of MF systems and understand the tradeoff between the incurred cost of multiple ferries and the improved performance. We show that the MF scheme scales well with the number of ferries in terms of throughput, delay and resource requirements in both ferries and nodes. he rest of this paper is structured as follows. Section II gives an overview of the MF scheme and describes the network model and the ferry route design problem. In Section III, we provide an overview of four algorithms to compute ferry routes, which will be described in details from Section IV to Section VII. We present simulation results in Section VIII to evaluate these algorithms and the MF performance. Related work is reviewed in Section IX and the paper is concluded in Section X. II. OVERVIEW OF MESSAGE FERRYING NEWORKS In this section we first give an overview of the Message Ferrying scheme. hen we describe the network model and the ferry route design problem. A. Message Ferrying Scheme he Message Ferrying (MF) scheme exploits controlled mobility to provide physical connectivity between otherwise disconnected nodes. In an MF scheme, network devices are classified as message ferries (or ferries for short) or regular nodes based on their roles in communication. Ferries are devices which take responsibility of carrying data among other nodes, while regular nodes are devices without such respon- Fig.. S R (a) ferry route radio transmission S R (b) ferry node An example of data delivery in an MF scheme. sibility. Fig. illustrates a simplified example of message ferrying, in which two ferries move around the area and relay data between otherwise disconnected nodes. In this paper, we consider networks that use multiple ferries to transport data between nodes. With multiple ferries, there are many possibilities of interaction between ferries. For example, data might be forwarded through multiple ferries before reaching the destination. In general, there are three types of ferry interaction. No interaction. Each ferry operates on its own without relaying data with other ferries. Ferry relaying. Ferries exchange data between each other directly. his requires ferries to be physically close to each other in order to communicate. Node relaying. Ferries interact with each other via stationary nodes, i.e., nodes buffer and relay data between ferries. So nodes need to have enough storage and energy for buffering and relaying data. Note that with node relaying, there is no need for ferries to meet each other because of the use of stationary nodes as relays. With ferry relaying, however, ferries need to synchronize their movement to meet each other for data exchange. As discussed later, synchronization has significant impact on the design of ferry routes. B. Network Model We now describe the network model considered in this paper. We consider networks with stationary regular nodes, each equipped with a wireless radio capable of transmitting to other nodes within a distance. he data rate of the radio is bits per second. We assume that the network is sparse such that nodes are disconnected from each other (i.e., the distance between each pair of nodes is larger than the radio range ) 4. We assume that bandwidth requirement between each pair of nodes is known and constant over time. In practice, while We will use the term node(s) to refer to regular nodes or both regular nodes and ferries. he usage should be clear from the context. We can set to account for the unreliability of the wireless medium, e.g., the loss rate of the links. 4 Our model can be applied to connected or partially connected networks. In these networks, ferries can carry data among a set of gateway nodes, which in turn communicate with other non-gateway nodes nearby using traditional ad hoc routing algorithms.

3 ,,,,,, (a) SIRA (b) MURA (a) (b) Fig.. Overview of ferry route design algorithms. traffic might not be known in advance, traffic demand can often be estimated. his is true especially for the MF scheme, which is expected to operate at large time scales, e.g., in minutes or hours. In addition, since ferries visit nodes occasionally, the impact of traffic burstiness is of less concern. o provide communication services to regular nodes, ferries are deployed, and. We assume that each ferry moves at a constant speed and ferries are equipped with the same radios as nodes, i.e., the radio range is and the data rate is bps. Ferries and nodes communicate via a shared wireless channel. herefore transmission and reception cannot occur at the same time. For a network with ferries, the total data rate that these ferries can support is no more than bps. his is because the wireless channel is shared among transmissions from data sources to the ferries and from the ferries to data destinations. Given ferries that could transmit or receive at bps simultaneously, we have the maximum total data rate of bps. C. Ferry Route Design Problem In this paper, we consider the design of ferry routes. We choose to minimize the average data delivery delay. While the delay of MF is significantly larger as compared to connected networks, achieving lower delay is still desirable for many applications. Specifically, we try to minimize the weighted delay for all traffic which is defined as # ( where from node - to node. #. he weight!"$# &%'( )*+!*"$# () %,( and are the weight and average delay for data specifies the relative importance of reducing delay for certain traffic and may be independent of the data rate. Now we define the ferry route design problem, which consists of finding optimal ferry routes such that the bandwidth requirements are met and the weighted delay is minimized. In this paper, we consider periodic ferry routes, i.e., ferries visit the same set of nodes periodically. In previous work [9], we show that designing an optimal route for a single ferry is NP-hard. hus as a generalized problem, the ferry route design problem with multiple ferries described above is also NP-hard. In the following sections, we will present several heuristic algorithms to compute ferry routes. Fig.. (c) NRA ferry node (d) FRA ferry movement Example of ferry routes generated by different algorithms. III. OVERVIEW OF FERRY ROUE DESIGN ALGORIHMS In this section we give an overview of the four ferry route design algorithms that we develop and present in the following sections. In general, these algorithms calculate ferry routes in three phases. In Phase, nodes are assigned to ferries. Ferries are responsible for carrying data for assigned nodes and cooperatively provide connectivity between each pair of sender and receiver. his assignment can be flexible, e.g., a node may be assigned to multiple ferries. Fig. (a) shows an example of node assignment where the numbers near each node denote the ferries the node is assigned to. We can see that some nodes are assigned to more than one ferry. Phase calculates each ferry route based on the locations of assigned nodes and the traffic load. Fig. (b) depicts an example of three ferry routes. In both Phase and, the algorithms focus on minimizing the weighted delay without considering the bandwidth requirements. In Phase, the ferry routes are extended, if necessary, such that the bandwidth requirements are met. So, rather than directly addressing the ferry route design problem, these algorithms break it into three subproblems and solve each sub-problem. As discussed in Section II, there are three types of interaction between ferries. In the following sections, we will present algorithms to calculate ferry routes based on different assumptions of ferry interaction. In Section IV, we describe the Single-Route Algorithm (SIRA) in which all ferries follow the same route. Section V presents the Multi-Route Algorithm (MURA) in which ferries can follow different routes. In both SIRA and MURA, there is no interaction between ferries. In Section VI and VII, we present the Node Relaying Algorithm (NRA) and the Ferry Relaying Algorithm (FRA), which utilize node relaying and ferry relaying, respectively, to forward data between ferries. Fig. shows simplified examples of ferry routes generated by these algorithms. hese algorithms differ mainly in how nodes are assigned to ferries because of the different assumptions about ferry interaction. Besides, FRA requires special treatment in calculating routes due to the synchronization issue. hese four algorithms represent different strategies in de-

4 < I " " K I " K / U signing ferry routes. In an MF network with multiple ferries, data may be relayed via multiple ferries before being delivered to the destination. hus for data between a sender/receiver pair, the average delay consists of delay in each ferry hop, which includes both the waiting time in node buffers before data is forwarded to a ferry and the carrying time in the ferry before data is relayed to another ferry or the destination. So, without relaying data between ferries, SIRA and MURA minimize the number of ferry hops. FRA tries to minimize the waiting delay in nodes through direct interaction between ferries. NRA tries to minimize the carrying delay in each ferry hop by using stationary nodes as relays. IV. SINGLE-ROUE ALGORIHM (SIRA) In this section, we describe the Single-Route Algorithm (SIRA) in which all ferries follow the same route but with different timing (see Fig. (a)). hat is, each node is assigned to all ferries which share the responsibility of transporting data between nodes. In the following we focus on Phase and, i.e., how to design a single ferry route for ferries. In prior work [9], we have developed algorithms to compute a ferry route for a single ferry. We now extend these algorithms for the case with multiple ferries. We assume that ferries have the same speed and move on the ferry route with equal distance in between. A. Single Ferry Route Design We first describe how to calculate a single ferry route. We try to minimize the weighted delay without considering the bandwidth requirements, which will be addressed in the next section. o compute the weighted delay, we need to determine the average delay for data between each sender/receiver pair. In an MF network, the average delay for data from node - to node. consists of the waiting delay in node - before a ferry picks up the data and the carrying delay in the ferry before ferries, the reaching node.. Given constant data rates and average waiting delay is / where / is the length of the ferry route and 6 is the ferry speed. his is because the round trip time for a ferry is /:6. With ferries, the time between ferry visits is /$; 6 and on average, the waiting delay is half of that, i.e., / Suppose that the distance from ( node - to node. in the route is <. he carrying delay is < average delay for data from node - to node. is /=> 698@? 56. So the :6. o compute the ferry route, we adapt solutions for the well-studied traveling salesman problem (SP) [7], [6] which compute a route to visit nodes. But instead of optimizing the length of the route as in SP, we optimize the weighted delay. Fig. 4 illustrates a sketch of the algorithm, which generates an initial route using some SP heuristic algorithm, e.g., the nearest neighbor heuristic, and then refines the initial route using local optimization techniques. We consider the following -opt and H-opt swap operations to improve the route. -opt swap. Consider the route as a cycle with edges that connect consecutive nodes in the route. A -opt swap removes two edges ACB and DE from the route and Compute an initial route using SP heuristic algorithm; do Apply -opt swaps; Apply H-opt swaps; while (weighted delay is reduced); Extend ferry route to meet bandwidth requirements; Fig. 4. Single-route algorithm. replaces them with edges AFD and BG while maintaining the route as a single cycle. H-opt swap. A H-opt swap moves a node in the route from one position to another. he algorithm tries to reduce the weighted delay of the route by applying -opt swaps and H-opt swaps until no further improvement can be found. B. Bandwidth Requirements In the previous section, we consider only the weighted delay. Now we consider how to extend the ferry route, if necessary, to meet the bandwidth requirements of the nodes. For any given route, the achieved data rate of a node is H* where H is the fraction of time the node communicates with ferries. So we need to extend the amount of time ferries spend in the vicinity of those nodes that do not otherwise have enough time to transmit or receive their data. In practice, the extension could consist of changing ferry speed, so that the ferry spends more time on certain parts of the route. However, since we have assumed constant ferry speed, the extensions consist of detours in the vicinity of the under-served node(s). Obviously the detours should be as short as necessary, in order to reduce the delay. We formulate this problem using linear programming as follows. Let I be the length of detour in the vicinity of node -. We assume ferries move to the location of each node, thus the total length of the ferry route that is within the radio range of node - is I?J. Let K be the total data rate for node - which is the sum of data rates in both transmission and reception. By distributing traffic load equally to ferries, each ferry is responsible for supporting a data rate of K ;. hus we have I /N??L5 58M POQ where / is the length of the ferry route before extension. After transformation, we get the following optimization problem. minimize subject to R SOQ I I P 9U R POQ I VK V and YXZ-[X\ ] W 5 he above problem can be solved efficiently using methods like Simplex []. ()

5 z EWD(^M_ ): EWD of node assignment after operation ^M_ Set the number of ferries to ` ; Assign each node to a ferry; while number of ferries acb or EWD is reduced do Identify the best ^ed5f)g&hjie_ or bkf)g!l:f operation ^M_m ; Identify the best bnf)gel:f;o or g&f)pqsrtf operation ^M_u ; if EWD(^M_ m ) v EWD(^P_ u ) and EWD(^M_=m ) v current EWD then Perform ^M_ m ; else Perform ^M_=u ; Refine node assignment to maintain feasibility; Compute each ferry route; Fig. 5. Multi-route algorithm. EWD refers to estimated weighted delay. V. MULI-ROUE ALGORIHM (MURA) In the MURA algorithm, ferries may follow multiple routes to carry data between nodes (see Fig. (b) for an example). But ferries do not relay data between themselves. So data is carried by at most one ferry. Fig. 5 shows a sketch of the MURA algorithm which uses a greedy heuristic for assigning nodes to ferries. MURA starts with ferries and each node is assigned to a ferry. hat is, each ferry route consists of one node. MURA refines the node assignment and reduces the number of ferries to by using four types of operations, which will be described in Section V-B. In each step, MURA estimates the weighted delay of the resulting node assignment for each operation and chooses to perform the best one until the number of ferries is and no further improvement can be found. We will describe the estimation of weighted delay in Section V-A. hen MURA modifies the node assignment, if necessary, to insure feasibility, i.e., there is a path between each sender/receiver pair and the total traffic load on each route is lower than its capacity. Given the node assignment, we can apply the algorithms in SIRA to compute each ferry route. In the following, we will describe how to estimate the weighted delay for a node assignment. hen we explain how to assign nodes to ferries and maintain feasibility. A. Estimated Weighted Delay We first describe how to estimate the weighted delay, or calculate the estimated weighted delay (or EWD for short). For a node assignment, the sender and receiver may be assigned to the same route or different routes. he EWD needs to account for the weighted delay contributed by both types of traffic. o compute the EWD for traffic within a route, we consider the following factors. First, the EWD should reflect the weights of traffic within the route, as implied by the definition of the weighted delay. Second, the data delay consists of the waiting time at nodes and the carrying time at ferries, both related to the length of the route. hus the EWD should account for the length of the route. hird, in an MF network, achieving higher data rate implies that ferries need to spend more time communicating with nodes, resulting in longer routes and larger delays. So the EWD should consider the traffic load in the route. Finally, the EWD should consider the number of ferries used in a route because it affects both the waiting delay at nodes and the amount of traffic carried by each ferry. Combining these factors together, we now define the EWD. Let / be the length of a SP route for nodes in the route. Let w and x be the total data rate and weight of traffic within the route. Suppose that the number of ferries following the route is y. he maximum data rate z of the route, or the capacity of the route, is :y bps. We define the EWD of the route as a two-component tuple 4{n {G}S8 where { } ~ { ~ x /CM? x /? w U z@8 if w Lz]ƒ if wl () z]ƒ if w \z]ƒ 8!? ˆ' 8 if wš (4) z] When the traffic load is over the capacity, {k is positive and measures how much the ferry route is overloaded. o differentiate {n between the case where w equals to z and the case with w z, we add a constant term ( in this Œz. When the traffic load paper) in computing { when w is below the capacity, {k is zero and {G} approximates the weighted delay for traffic in the route. Obviously {k is the more significant component when comparing two EWDs, i.e., +{n { } 8JŽ +{ {G} 8 if either {n Ž { or {n { and { } ŽV{ } is true. We now explain the definition of EWD in (4) in more details. he use of total traffic weight x and the route length / is obvious. he factor M*? 8 is to approximate the average delay for traffic within the route. As discussed in Section IV, the average ( delay for( data from node - to node. is /4,y698?< 56, where < is ( the distance from node - to node. in the route. If we set < to /$5, the average delay becomes MY? 8. So we use the factor? 8 in (4). o account for the impact of traffic load, EWD incorporates the factor M? ˆ' 8. his is because to meet the bandwidth requirements, ferries need to spend enough time within range of nodes, which implies detours in ferry routes, as explained in Section IV-B. Suppose that I is the total length of detours. o support a total data rate of w, we have I z In?L/ w IJ w U / w Here we make an approximation that the length of the route that is within range of nodes is I. So the total length of the route after extension is /? 8. By combining these ˆ' factors, we obtain the definition of EWD in (4). We further define the EWD for traffic between two routes, say route - and.. o support this traffic, MURA may need to extend route - or. such that both the sender and receiver are on the same route because data is not relayed between ferries. herefore, we define the EWD for traffic between route - and. as the increase in the EWD of the extended route. Specifically, suppose that route - is extended to overlap with route. by visiting the closest node in route.. he EWD of route - will increase due to the increase in the length of the route and the

6 traffic load. Similarly, the EWD of route. would increase if route. is extended. So we define the EWD for traffic between route - and route. as the minimum increase in the EWD by extending either route - or.. Given the EWDs for traffic within each route and between routes, we can compute the EWD for the node assignment by summing up these EWDs, i.e., adding the two components of each EWD respectively. o compute the EWD of a node assignment, we need to determine the traffic each route is responsible for. In this paper, we adopt the following routing strategy to balance load among ferry routes. Initially, no traffic is assigned to ferry routes. We assign traffic to a route if both the sender and receiver are on the route. When traffic is within multiple routes, traffic will be assigned to a route such that the increase of the EWD is minimal. hen we consider traffic between routes. Similarly, traffic will be assigned to routes with minimum increase of EWD. Given the assignment of traffic, we can calculate the EWD of the node assignment as described above. B. Assigning Nodes to Ferries In this section, we describe how MURA assigns nodes to ferries using the EWD. We consider four types of operations on ferry routes. Let - and. be two routes. \ ; sš <4 œž-.s8. his operation overlaps two routes, i.e., one route is extended to include a node in the other route. he number of ferries in each route does not change. When there are multiple nodes in - or., we choose the overlapping node such that the resulting node assignment has the minimum EWD. š &Ÿ š -.s8. his operation combines - and. into a new route. he number of ferries in the new route is the sum of the number of ferries in - and.. š &Ÿ š -.s8. his operation is the same as š &Ÿ š -.'8 except that the number of ferries for the new route is one less than that of š &Ÿ š +-.s8. š %: š - 8. his operation reduces the number of ferries in route - by one. hus it only applies to routes with more than one ferry. Now we describe how MURA chooses the best operation to perform in each step. Specifically, MURA identifies the best ; 'š <+ &œ operation among all pairs of routes by computing the EWD of the resulting node assignment. Similarly, MURA identifies the best š &Ÿ š, š &Ÿ š and š %, š operations. Because the ; sš <+ &œ or š &Ÿ š operation does not reduce the total number of ferries used, it will be chosen only when it outperforms the š &Ÿ š and š %, š operations and improves upon the current node assignment. If so, MURA will perform either the ; sš ;<4 &œ or š &Ÿ š operation, depending on which one achieves the lower EWD. Otherwise, MURA will perform either the š Ÿ š or š %, š operation, again depending on the EWD. MURA will continue this process until the number of ferries is and no further improvement can be found. So far, nodes are assigned to ferries such that the EWD is minimized. Due to the fact that MURA is a greedy heuristic, there is a possibility that the node assignment is not feasible, i.e., some sender and receiver are not in the same route or procedure NFRA(r, c) Divide area into a grid of gf nr cells; Assign each node to the cell it belongs to; Compute traffic load on cells using geographic routing; Add inter-route connectivity; Allocate ferries to cells; end /* main algorithm */ minewd ; for every r t r)ª)«that satisfies r rª$ Nb NFRA(r, r)ª ); if current EWD v minewd then minewd current EWD; (min,min ª ) (r, r ª ); NFRA(min, min ]ª ); Compute each ferry route; Fig. 6. do Sketch of NRA and FRA algorithms. the total amount of traffic in a route is over its capacity. o insure feasibility, MURA further refines the node assignment if necessary. Specifically, if the total amount of traffic in a route is over its capacity, MURA performs a š &Ÿ š or ; sš <4 œ operation between this route and another route such that the resulting EWD is minimal. Similarly, if there is traffic between routes, MURA performs a š &Ÿ š or ; 'š <+ &œ operation between these routes. his procedure continues until the node assignment is feasible. VI. NODE RELAYING ALGORIHM (NRA) In the Node Relaying Algorithm (NRA), data is relayed between ferries via nodes. hat is, ferries forward data to a node and other ferries receive data from this node. By exploiting the fact that nodes are stationary, node relaying eliminates the requirement of synchronization between ferries. Fig. 6 shows a sketch of NRA. NRA adopts a geographic approach for assigning nodes to ferries. ;E Specifically, the deployment area is divided into a grid of cells. Ferries are assigned to cells and would carry data for nodes within the cell and relay data between cells. his actually implicitly assigns nodes to ferries via cells. Since the number of ferries is, we have X. For every possible combination of and, NRA computes the estimated weighted delay as described in Section V-A and chooses to perform according to the combination that achieves the minimum EWD. Given the node assignment, we can compute each ferry route using algorithms in Section IV. In the following, we will describe how NRA adds connectivity between ferry routes and allocates ferries to routes. A. Connectivity between Ferry Routes As described above, each ferry route is initially within a cell. When the sender and receiver of traffic are located at different cells, data has to be forwarded through multiple cells before reaching the destination. In the following, we describe the routing algorithm used and how NRA extends ferry routes to maintain the required connectivity of the network. NRA uses geographic routing, i.e., data is forwarded along cells

7 that intersect with the line segment connecting the source and destination. Fig. 7 shows an example of geographic routing where data from node to is routed through cells D, D ± and D². o support data forwarding between cells, NRA extends ferry routes to add connectivity between ferry routes. Specifically, when there is traffic between two neighboring cells, NRA performs the ; sš ;<4 &œ operation defined in Section V on the ferry routes in these cells. he ; 'š <+ &œ operation extends one route to overlap with the other and the overlapping node will relay data between these two routes. NRA continues this process until there is a path between each sender/receiver pair according to the routing algorithm. he above discussion assumes that each cell contains nodes. In case of irregular node distribution, there might be empty cells that contain no node. We classify two types of empty cells, depending on whether there is traffic forwarded through the cell. If there is no through traffic, we can ignore this cell. When an empty cell has through traffic, however, a ferry route needs to set up to relay data. Instead of using a separate ferry route for each such empty cell, we use a single route for all neighboring empty cells as follows. Suppose that D$³ is an empty cell with through traffic. Let be a set of empty cells, which initially contains only cell D³. NRA adds an empty cell to if the cell has through traffic and it is adjacent to another cell in. NRA continues adding cells to until no more cells can be added. he cells in then form a region which contains no node but needs to relay traffic. o handle through traffic in, NRA sets up a new route by identifying the set of non-empty cells that forward or receive traffic with cells in and constructing a ferry route that passes through all these cells, e.g., choosing one node from each of these cells and forming a new route. By overlapping routes in neighboring cells and adding routes for empty cells, NRA insures that there is a path, possibly through multiple ferry routes, between each sender/receiver pair. B. Assigning Ferries to Routes he geographic routing algorithm used might distribute traffic load unevenly among ferry routes. For example, the ferry routes in the center of the deployment area often need to carry more traffic because more traffic passes through that area. Ferry routes might also have uneven load due to the irregularity in node distribution. o provide load balancing, NRA allocates ferries to routes according to the traffic load. Specifically, NRA initially assigns one ferry to each route. If there are remaining ferries, NRA computes the expected weighted delay for each ferry route and allocates one of the remaining ferries to the route with the highest EWD. he addition of a ferry decreases the EWD of this route. NRA will repeat this process until all ferries are allocated. Using this approach, NRA accommodates uneven traffic load in ferry routes by allocating more ferries to routes with higher load. VII. FERRY RELAYING ALGORIHM (FRA) In the Ferry Relaying Algorithm (FRA), data may be forwarded through multiple ferry routes while being routed Fig. 7. C C n C C5 n C4 node routing path Example of geographic routing in NRA. to the destination. But instead of relaying data via nodes as in NRA, ferries exchange data directly. herefore, ferry routes need to be synchronized, to some extent, for two ferries to meet each other. When the length of two ferry routes are not the same, the contacts between ferries often occur irregularly. So data has to be buffered in a ferry for a significant period of time before it can be forwarded to another ferry, leading to long delays. In this paper, therefore, we consider ferry relaying by synchronizing ferry routes in length. he operation of FRA is similar to NRA (see Fig. 6 for a sketch of the algorithm). Briefly, FRA divides the area into a grid of µ cells and uses the geographic routing algorithm to forward data. Based on traffic load, FRA allocates ferries to routes to balance load among routes. As in NRA, FRA chooses the best combination of and to minimize the EWD. However, due to the synchronization requirement between ferry routes, FRA differs in how to add connectivity between routes and how to calculate ferry routes. In addition, FRA sets up a ferry route for each cell except empty cells that have no through traffic. In the following, we will describe the issue of synchronization between ferry routes and explain how to compute ferry routes in FRA. A. Synchronization between Ferry Routes In this section, we describe how to achieve synchronization between ferry routes. We assume that all routes have the same length. In the next section, we will describe how routes are extended to have the same Z length. Suppose that the area is divided into a grid of cells. We first consider the case with a one-dimensional grid, i.e., or. In this case, a route interacts with at most two other routes in the neighboring cells. We assume that ferries meet each other at the middle points of the boundary between cells, which we call contact points (see Fig. 8(a)). o insure ferries in neighboring cells are able to meet each other in every period of their movement, FRA requires that ferries in neighboring cells move in reverse direction, and the contact points partition each ferry route into two segments of the same length (see Fig. 8(a)). Now we consider the case with a two-dimensional grid, i.e., Ž and Ž. In this case, a ferry route may interact with up to eight other routes in neighboring cells. Similar to the

8 / case with a one-dimensional grid, each route has eight contact points. o insure contacts between ferries in all neighboring cells, ferries move in different directions and timing, as shown in Fig. 8(b). FRA also requires that contact points partition each route into eight segments of the same length. he above discussion assumes that each route has a single ferry. When a route has multiple ferries, the contact points will be visited more frequently. In this case, the above requirements hold except that the route length should be proportional to the number of ferries in the route, i.e., /$5y is the same for all routes where / is the length of a route and y is the number of ferries in the route. B. Calculating Ferry Routes In this section, we describe ferry route design in FRA, which consists of designing individual ferry routes and synchronizing routes to have the same length. As discussed above, for synchronization purpose, the ferries need to visit regular nodes within a cell as well as the contact points on the boundary of the cell. In addition, the route segment between contact points should be of the same length. We adopt the following approach in computing the route for each cell. We first construct an initial route that contains only the contact points. hen we insert regular nodes to the route until all nodes are in the route. his can be done by adding nodes to the route segment that is between the two closest contact points to the node. Given the ferry route computed as above, we need to extend the ferry route, if necessary, to meet the bandwidth requirements. We extend the linear programming problem in () to account for synchronization. Specifically, in addition to the constraints for bandwidth requirements for each node, we add new constraints that the route segments between contact points are of the same length. Now we consider how to synchronize all ferry routes. FRA identifies the ferry route with the maximum length and extends other routes to have the same length. Let / be the maximum, length of ferry routes. Consider a route - that has length / /. o extend route -, FRA increases the detour of ferry route within the radio range of each node. Suppose that the length of the detour for node. in route - is I. FRA extends I to I } such that +I*}?Z 58t/ ¹I?L5 8t/ where is the radio range. Note that the achieved data rate for node. is proportional to the portion of time node. is within range of ferries, i.e., +I?µ 58P5/ before extension and +I*}?µ5 8t/ after extension. herefore, the bandwidth requirements are met after synchronization. VIII. SIMULAION RESULS In this section, we evaluate the performance of the Message Ferrying schemes using simulations. We first compare the performance of the four algorithms under different network conditions. We then focus on how MF scales with traffic load and the number of ferries used. Our results show that MF scales well with the number of ferries in terms of throughput, delay, and resource usage in nodes and ferries. Fig. 8. contact point ferry movement (a) (b) Synchronization between ferry routes. We now describe the network settings studied in this paper. In our simulations, nodes are randomly distributed in a :y= :ys area. ferries are deployed which move at a speed of : :K. he transmission range of both the nodes and the ferries is &:: and the data rate is mbps. We consider both ad hoc traffic, where each node sends data to a randomly chosen node, and sensor traffic, where all nodes transmit data to a special node called the sink. In addition, traffic rates can be uniform, i.e., all flow have the same data rate, or non-uniform where Se flows transmit 9% of the total traffic and the rest sends % of the total traffic. We assume that data are generated at constant bit rates and set the weights of all traffic to be the same as the data rates. Given node locations and the traffic models, we use the algorithms developed in previous sections to compute the ferry routes. For each setting, the result is averaged over runs with different random seeds. We use the weighted delivery delay defined in () as the main performance metric to evaluate the MF schemes. In addition, we consider the resource requirements, namely buffers and energy, in nodes and ferries. We define the buffer requirement for a node as the minimum amount of buffer such that no data would be dropped in the node due to buffer overflows. For a ferry route with length / and y ferries, the buffer requirement for a node is º)/:69y bits where º is the transmission rate of the node and 6 is the ferry speed. his is because ferries visit the node every /:69y period of time. Similarly, the buffer requirement for a ferry is the minimum amount of buffer such that no data would be dropped in the ferry due to buffer overflow. We also measure the energy consumption in nodes and ferries, which can be approximated using the average transmission rate of nodes and ferries, including both originating and through traffic. A. Comparison of Algorithms In this section, we compare the performance of the four algorithms presented in previous sections. We first present results for networks with 4 nodes and uniform ad hoc traffic. In Fig. 9, the results are normalized to the performance of SIRA. Fig. 9(a) shows the weighted delivery delay for routes computed using the four algorithms. he results are normalized according to the SIRA algorithm. We make the following observations. First, these algorithms achieve similar weighted delay when the number of ferries is small or the traffic load is high. In both cases the space for route design is

9 Normalized Message Delivery Delay MURA, m=4 MURA, m=6 NRA, m=4 NRA, m=6 FRA, m=4 FRA, m= Network Load (Ad Hoc raffic) Normalized Ferry Buffer MURA, m=4 MURA, m=6 NRA, m=4 NRA, m=6 FRA, m=4 FRA, m= Network Load (Ad Hoc raffic) Normalized Node Buffer MURA, m=4 MURA, m=6 NRA, m=4 NRA, m=6 FRA, m=4 FRA, m= Network Load (Ad Hoc raffic) (a) Message delivery delay (b) Ferry buffer (c) Node buffer Fig. 9. Performance of different algorithms with ad hoc traffic. significantly limited. Second, MURA achieves the best delay when the number of ferries is large. In contrast, FRA performs worst due to the route synchronization which significantly increases the length of each route. hird, SIRA achieves reasonably good performance for ad hoc traffic regardless of its simplicity. Fourth, when the traffic load is relatively high, both NRA and FRA often become the same as SIRA, i.e., a single route is used and all ferries are assigned to this route. his is because relaying data increases the total traffic load in the network, which would be costly when the original traffic load is relatively high. Fig. 9(b) depicts the buffer requirement in the ferries. We can see that both NRA and MURA require less buffering as compared to SIRA. his is because of the shorter routes generated by these algorithms. In SIRA, the route must visit all nodes, thus the length of the route is normally much larger than routes in NRA or MURA. With a longer route, data will be kept in ferry buffers for a longer period of time, leading to larger buffer requirements in ferries. Similarly, the buffer requirement for FRA is large because of route synchronization. Fig. 9(c) shows node buffer requirements which differ significantly from ferry buffer requirements in Fig. 9(b). We can see that SIRA uses the smallest number of buffers in nodes. While ferry buffers are determined by the length of the routes, node buffers are determined by the average time between contacts with the ferries. his is because node buffers store data generated at the node before being transmitted to a ferry. In SIRA, while the route is long, the average time between contacts with ferries is short because all ferries are following the same route. So nodes require fewer buffers in SIRA. We note that MURA requires more buffers than NRA which uses nodes to relay data. his is because in NRA, each route is often limited within a cell. In contrast, the routes generated by MURA may span the area due to the random traffic pattern we used. hus MURA uses more buffers. We evaluate the performance of the four algorithms in networks with uniform sensor traffic. he results are similar to the case with ad hoc traffic and skipped here due to space limits. One notable difference is that as compared with SIRA, both MURA ad NRA perform better with sensor traffic, which is due to the load balancing effects of using multiple routes. Fig.. Normalized Energy Consumption NRA, m=4, node NRA, m=6, node NRA, m=4, ferry NRA, m=6, ferry FRA, m=4, ferry FRA, m=6, ferry Network Load (Ad Hoc raffic) Energy consumption of different algorithms with ad hoc traffic. We also run simulations for networks with non-uniform ad hoc traffic and non-uniform sensor traffic. he results are similar but SIRA performs better with non-uniform traffic. his is because with non-uniform traffic, estimation of the weighted delay becomes less accurate, which degrades the performance of MURA/NRA/FRA. We now consider the energy consumption for these algorithms. Since MURA and SIRA do not relay data, the total energy consumption in the nodes and ferries are the same for both algorithms. In addition, FRA does not relay traffic using nodes, so the energy consumption in nodes is the same as SIRA/MURA. Fig. depicts the energy consumption in NRA and FRA, normalized to that of SIRA/MURA. We can see that in NRA, nodes may need to transmit as much as twice of its own data, which suggests that NRA is not suitable for environments where nodes are constrained in power supplies. As we can see, these algorithms perform differently in the achieved delay and resource requirements in ferries and nodes. In general, MURA achieves the best delay among the four algorithms. hus in the rest of this paper, we present only results of MURA. B. Impact of raffic Load We now study the performance of the MF scheme under different traffic loads. Fig. (a) shows the weighted delay for ad hoc traffic. We can see that the delay increases with the throughput per node. he increase of delay is slow when the throughput is low but becomes dramatic when the throughput is above some threshold. his behavior suggests that the

10 network should operate under this threshold. Fig. (a) also illustrates that this threshold can be increased by using more ferries. he behavior of the tradeoff between throughput and delay shown in Fig. (a) is similar to that in connected networks. However, in an MF network, this tradeoff is the consequence of the physical separation between nodes, instead of the burstiness of traffic as in connected networks. Fig. (b) and Fig. (c) show the buffer requirements in ferries and nodes, which have similar behavior as the weighted delay. In fact, the increase in both buffer requirement and delay results from the longer routes when traffic load is high. his is because the ferries need to spend more time communicating with nodes. When ferry routes become longer, waiting delay for data in nodes is larger. So the node buffer requirements increase. In addition, ferries need to receive more data from nodes in each visit when traffic load is high, requiring more buffers to hold the data. C. Impact of Number of Ferries In this section, we study the data delivery performance with different number of ferries. Fig. shows the results for networks with 4 nodes and uniform ad hoc traffic. Fig. (a) shows that for given traffic load, the delay decreases as the number of ferries increases. his is as expected because with more ferries, each ferry needs to carry less amount of traffic and/or visit smaller number of nodes, leading to shorter routes and smaller delays. When the traffic load is low, e.g., at a rate of kbps per node, the improvement in delay due to the increased number of ferries is modest. his is because the delay is dominated by the distance between nodes. However, when the traffic load is high, an increase in the number of ferries can significantly reduce the delay. For example, for a per node throughput of 56kbps, the delay is.57 hours when ferries are used while the delay is. hours when only one ferry is used. his can be explained by the behavior of the tradeoff between throughput and delay shown in Fig.. In this case, 56kbps is close to the capacity of a single ferry. hus the addition of another ferry will reduce the load by half, resulting in modest delay. Fig. (b) and Fig. (c) show the buffer requirements in nodes and ferries with different number of ferries. As expected, the buffer requirements decreases as the number of ferries increases. his is consistent with the results shown in Fig.. D. Impact of raffic Patterns In this section, we investigate how traffic patterns impact the performance of an MF network. Fig. (a) compares the delay under different types of traffic. he traffic load in the figures is defined where º is the per node throughput. We can see that for the same traffic load, networks with non-uniform traffic can achieve lower delay than networks with uniform traffic. his is because for non-uniform traffic, the algorithms can optimize the delay for traffic with larger weights, which improves the total weighted delay. We also note that when the traffic load is low, the delay for both sensor traffic and ad hoc traffic is similar. However, when the traffic load is high, the delay with sensor traffic is larger than that with ad hoc traffic. his is because of the traffic aggregation at the sink in networks with sensor traffic. Fig. (b) shows the ferry buffer requirements. We can see that the buffer requirement with sensor traffic is higher than that with ad hoc traffic. his is because with sensor traffic, a ferry needs to buffer data from all nodes in the route before the ferry meets with the sink and transmits data to the sink. So ferries require more buffers as compared to the case with ad hoc traffic. Fig. (c) depicts the node buffer requirements under different traffic models. Contrast to ferry buffer requirements, nodes require more buffers in the case with ad hoc traffic. With sensor traffic, data from all nodes are sent to the sink. As compared to ad hoc traffic, this concentration of traffic leads to fewer routes with more ferries in each route. So ferries visit nodes more often which reduces the node buffer requirements. IX. RELAED WORK In this section, we review some related work on delaytolerant networks (DNs) and mobility-assisted schemes. DNs are an emerging class of networks where end-to-end paths may not exist between some or all nodes [], [5]. his is in contrast to the traditional network model which assumes networks are connected. In [5], Jain et al. study routing in DNs and develop routing algorithms based on different knowledge about network topology. While DNs may lack end-to-end paths at any instant in time, researcher are observing that node mobility can be leveraged to provide paths over time. he main idea is that a mobile node carries a packet for a period of time as part of realizing a path from source to destination. For example, Vahdat and Becker [6] propose Epidemic Routing in which mobile nodes carry data and exchange data when they meet, essentially flooding data throughout the network. In the Data Mules project, Shah et al. [4] propose to exploit mobile entities in the environment to collect and transport data from sensors to access points, thus conserving energy in resourcelimited sensors. In a theoretical paper [], Grossglauser and se prove that mobility can significantly improve the capacity of the network. here is also other work in exploiting node mobility for data transport [6], [9], [4], [7], [5]. he above approaches exploit existing node mobility for communication purposes. Our work differs in the use of controlled mobility which enables the network to adapt to applications. Controlled mobility is an active research area in the robotics community; see [] and its references. However, there has been little effort in exploiting this capability for communication purposes. Li and Rus [] consider proactive movement of nodes to deliver messages in a disconnected environment and present an algorithm to compute optimal node trajectories. In [], Goldenberg et al. present a distributed mobility control scheme to adjust node positions such that energy consumption in communication is minimized. hey focus on connected

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms Wenrui Zhao, Mostafa Ammar and Ellen Zegura College of Computing, Georgia Institute of Technology, Atlanta, Georgia 3332

More information

A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks

A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Wenrui Zhao, Mostafa Ammar and Ellen Zegura College of Computing, Georgia Institute of Technology, Atlanta, Georgia 3332 {wrzhao,

More information

A Message Ferrying Approach for Data Delivery. How to deliver data in sparse networks

A Message Ferrying Approach for Data Delivery. How to deliver data in sparse networks A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Wenrui Zhao, Mostafa Ammar, and Ellen Zegura College of Computing, Georgia Institute of Technology MobiHoc 2004 Presented

More information

Delay Tolerant Networks

Delay Tolerant Networks Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected

More information

Ferry Route Design with MAC Protocol in Delay Tolerant Networks

Ferry Route Design with MAC Protocol in Delay Tolerant Networks Ferry Route Design with MAC Protocol in Delay Tolerant Networks Chaitra T K 1, Dr A S Poornima Ph.D 2 1 Student, Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur

More information

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo. Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Richard Kershaw and Bhaskar Krishnamachari Ming Hsieh Department of Electrical Engineering, Viterbi School

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic. Message Ferrying

ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic. Message Ferrying ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic 1 Message Ferrying Group 9 Timbo Yuen (tty2@sfu.ca) Dan Hendry (danh@sfu.ca) Yazan Shehadeh (ysa5@sfu.ca)

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

Integrated Buffer and Route Management in a DTN with Message Ferry

Integrated Buffer and Route Management in a DTN with Message Ferry Integrated Buffer and Route Management in a DTN with Message Ferry Mooi Choo Chuah Wen-Bin Ma chuah@cse.lehigh.edu wem2@.lehigh.edu Department of Computer Science and Engineering 19 Memorial Drive West,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport

Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport Holger Karl Computer Networks Group Universität Paderborn Overview Dependability requirements Delivering single packets Delivering

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,

More information

Backup segments. Path after failure recovery. Fault. Primary channel. Initial path D1 D2. Primary channel 1. Backup channel 1.

Backup segments. Path after failure recovery. Fault. Primary channel. Initial path D1 D2. Primary channel 1. Backup channel 1. A Segmented Backup Scheme for Dependable Real Time Communication in Multihop Networks Gummadi P. Krishna M. Jnana Pradeep and C. Siva Ram Murthy Department of Computer Science and Engineering Indian Institute

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach

Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach Biljana Stojkoska, Ilinka Ivanoska, Danco Davcev, 1 Faculty of Electrical Engineering and Information

More information

ACICE-2013 ISSN: ; e-issn

ACICE-2013 ISSN: ; e-issn 1022 A Novel Ferry-Initiated Message Ferrying Approach for Data Delivery in Disconnected Mobile Ad Hoc Networks through Native Ferries K. MURALIDHAR 1, N. GEETHANJALI 2 1 Assistant Professor, Department

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

CONCLUSIONS AND SCOPE FOR FUTURE WORK

CONCLUSIONS AND SCOPE FOR FUTURE WORK Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this

More information

On the Minimum k-connectivity Repair in Wireless Sensor Networks

On the Minimum k-connectivity Repair in Wireless Sensor Networks On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu

More information

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Clemson University TigerPrints All Theses Theses 8-2014 A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Raihan Hazarika Clemson University, rhazari@g.clemson.edu Follow

More information

UNIT 1 Questions & Solutions

UNIT 1 Questions & Solutions UNIT 1 Questions & Solutions 1. Give any 5 differences between cellular wireless networks and ADHOC wireless network. Ans: The following table shows the difference between cellular networks and Adhoc wireless

More information

Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony

Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony 2018 5th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2018) Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony Luo Xiaojuan, Yan

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-56 DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS Haftom Gebrehiwet Kidanu 1, Prof. Pallam

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks Georgia State University ScholarWorks @ Georgia State University Computer Science Theses Department of Computer Science 12-4-2006 An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

T Computer Networks II Delay Tolerant Networking (DTN)

T Computer Networks II Delay Tolerant Networking (DTN) T-110.5111 Computer Networks II Delay Tolerant Networking (DTN) 25.11.2013 Matti Siekkinen Large part based on slides by: Thomas Plagemann: Message Routing & Event Notification in Sparse Mobile Networks

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-

More information

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network A Genetic-Neural Approach for obility Assisted Routing in a obile Encounter Network Niko P. Kotilainen, Jani Kurhinen Abstract--obility assisted routing (AR) is a concept, where the mobility of a network

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks

Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department RPI Mobile Wireless Networks Wireless nodes

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Delivery Network on the Internet

Delivery Network on the Internet Optimal erver Placement for treaming Content Delivery Network on the Internet Xiaojun Hei and Danny H.K. Tsang Department of Electronic and Computer Engineering Hong Kong University of cience and Technology

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

CSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture

CSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture CSC8223 Wireless Sensor Networks Chapter 3 Network Architecture Goals of this chapter General principles and architectures: how to put the nodes together to form a meaningful network Design approaches:

More information

Receiver Based Multicasting Protocol for Wireless Sensor Networks

Receiver Based Multicasting Protocol for Wireless Sensor Networks Receiver Based Multicasting Protocol for Wireless Sensor Networks Madesha M Assistant Professor, Department of CSE Sahyadri College of Engineering and Management Chaya D Lecturer, Department of CSE H.M.S

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

Data Gathering for Wireless Sensor Network using PEGASIS Protocol Data Gathering for Wireless Sensor Network using PEGASIS Protocol Kumari Kalpna a, Kanu Gopal b, Navtej katoch c a Deptt. of ECE, College of Engg.& Mgmt.,Kapurthala, b Deptt. of CSE, College of Engg.&

More information

On Pairwise Connectivity of Wireless Multihop Networks

On Pairwise Connectivity of Wireless Multihop Networks On Pairwise Connectivity of Wireless Multihop Networks Fangting Sun and Mark Shayman Department of Electrical and Computer Engineering University of Maryland, College Park, MD 2742 {ftsun, shayman}@eng.umd.edu

More information

Graph Theoretic Models for Ad hoc Wireless Networks

Graph Theoretic Models for Ad hoc Wireless Networks Graph Theoretic Models for Ad hoc Wireless Networks Prof. Srikrishnan Divakaran DA-IICT 10/4/2009 DA-IICT 1 Talk Outline Overview of Ad hoc Networks Design Issues in Modeling Ad hoc Networks Graph Theoretic

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 12, December 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Design Approach

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks Sushma K M, Manjula Devi T H [PG Student], [Associate Professor] Telecommunication Department Dayananda Sagar College of

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University

More information

An Algorithm for Dynamic SDN Controller in Data Centre Networks

An Algorithm for Dynamic SDN Controller in Data Centre Networks IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 04-08 www.iosrjen.org An Algorithm for Dynamic SDN Controller in Data Centre Networks Nirmala 1, Oliveruth 2, Varun 3 1

More information

Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network

Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network Anil Kumar Mahto anil.fiem16@gmail.com Ajay Prasad Department

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.854

More information

UAV ASSISTED DISRUPTION TOLERANT ROUTING

UAV ASSISTED DISRUPTION TOLERANT ROUTING UAV ASSISTED DISRUPTION TOLERANT ROUTING Michael Le, Joon-Sang Park, and Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 Email: {mvleljsparklgerla} @cs.ucla.edu

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Replacing Failed Sensor Nodes by Mobile Robots

Replacing Failed Sensor Nodes by Mobile Robots Replacing Failed Sensor Nodes by Mobile Robots Yongguo Mei, Changjiu Xian, Saumitra Das, Y. Charlie Hu and Yung-Hsiang Lu Purdue University, West Lafayette {ymei, cjx, smdas, ychu, yunglu}@purdue.edu Abstract

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo. Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density

More information